SlideShare una empresa de Scribd logo
1 de 11
Second International Conference on Advances in Engineering and Technology
(ICAET-2022)- (Online)
ICAET-2022
Organised by
RSP Conference Hub, Coimbatore, Tamilnadu, India
Date: 29/09/2022& 30/09/2022
Paper ID : 220943 Category : UG
Paper Title : BLOCKCHAIN BASED SOLUTION VIA COMPUTER
SCIENCE TO SECURE IOT
Presented by
Mr. Pugalenthi M S,
Student - UG
Bannari Amman Institute of
Technology,
Erode.
Authors Details
Mr. Pugalenthi M S,
Mr. Dakshinesh M S,
Mr. Pibhin Chandra S,
Ms. Rithani R S,
Ms. Dhanushika Shree V
Student - UG
Bannari Amman Institute of Technology,
Erode.
Paper Id : 220943
Presenter Category : UG
Key talking
points
 Abstract
 Introduction
 Literature Review
 Methodology
 Results & Discussion
 Conclusion
Paper ID : 220943 Category : UG
PRESENTATION FRAMEWORK
ABSTRACT
 Our idea is to make IOT a secure on with the help of blockchain technology Via Computer
Science
 We all know that the COP is achieved through the advancements seen in wireless sensor
network devices that were able to communicate through the network thereby exchanging
information and performing various analysis.
 In internet of things, the exchange of information and data authentication is only done
through the central server not by any other source there by leading to the security and
privacy concerns.
 Chances of device spoofing, less reliability, false authentication in data sharing could happen.
 To address such security threat and concerns over the privacy, a central server is eliminated
and blockchain technology is introduced as a part of IOT.
Paper ID : 220943 Category : UG
Introduction
 The largely unregulated IoT market leaves plenty of room for device hacking which can lead
to a lot of speculation.
 IoT applications such as smart homes, smart gadgets and smart cars, this is the biggest
problem which can lead to a dangerous problem for the consumer. A hacker or an un
authorized person, could take over a self-driving car without appropriate permission with
someone in it, or make very costly purchases based on access levels given to an Internet of
Things system.
 While there are many security recommendations for IOT devices, such as biometrics and
two-factor authorization or authentication still there is a lot of loop hole for security, one
potential solution is blockchain IOT security.
 Blockchain, which is most familiar for bitcoin and Ethereum which are the famous types of
cryptocurrencies, offers an intriguing solution for IoT security.
 Blockchain contains strong protections against data tampering, locking access to Internet of
things devices which is pretty good, and allowing compromised devices in an IoT network to
be shut down. Hyundai the famous car maker has recently backed a blockchain start-up.
Paper ID : 220943 Category : UG
Literature Review
 This work presents a brief introduction of the IoT accompanied by a summary of major
security requirements and challenges in IoT.
 This work presents an in-depth survey and explores the state-of-the-art blockchain
technology by highlighting its background, characteristics, classification, architecture and
consensus mechanisms.
 This work highlights the motivation behind integrating blockchain technology and IoT by
exploring the achieved security improvements in this regard.
 This work comprehensively reviews the recent research efforts on blockchain based
solutions for enhancing IoT security and various blockchain based IoT applications.
 Finally, in addition to highlighting the research challenges in decentralizing IoT systems
using blockchain technology, this work enumerates several future research directions for
open IoT security problems.
Paper ID : 220943 Category : UG
Methodology
Paper ID : 220943 Category : UG
INTERNET OF THINGS:
 In this session, we learn briefly about Internet of Things (IOT) as it is
one of the vast fields in Technology. It makes the object such as the fan,
heater, air conditioners and so on gets smart with provision of various
things.
 Without the Internet Protocol (IP), we can’t access the IOT devices. It
can get access at minimum-specified IPv4 address and goes up IPv6 as
the latest support.
 ADRC means Auto Discovery Resource Control defines an application
layer that initiates protocol and to implement applications on IOT devices.
 Upon the Internet of Things, there are four core security threats that are
making disadvantage to this paper. Above all, it makes that lack of a
singular, and to solve what was the straightforward solution for
protecting theirs security.
BLOCK CHAIN:
 Block chain is a new trending technology which we can store data
securely and it is a decentralized, distributed ledger that can make the
blocs linked with hashing.
 One of the prominent hashing algorithms is SHA- 256. It can’t change
or hack the trans- system.
 At Block chain, the biggest trending Innovation about blockchain is , if we
do to prove it was safe for the peoples, then it increases adoption within
the IoT security area. Its transparency and traceability, blockchain gained
interaction among the techies and for the students who took on
computer side department.
 According to Blockchain bounce, it can help for public or nationalized
bankand private bank sectors which we prevent bouncing in the account.
It also promises security through truth and transparency.
FUTURE TRENDS
 Blockchain is at the nexus of technologies like IoT, AI and Cloud. It has
means of bringing the missing elements of trust that is currently lacking
from these technologies. Trust is gained through diversity. user interface,
integrity of users.
 When Artificial Intelligence, IoT and Cloud computing use blockchain to
track provenance, proofs and permissions associated with data used and
emanating from these systems the trust in the data is increased rapidly.
 This trust will allow IoT, AI and Cloud to be adopted without fear of
compromise and closing the loop holes of security in these technologies,
ushering in a new era of application and adoption of these technologies
to change everyday life for the betterment of the consumer.
REFERENCES
[1] "The future of blockchain in 8 charts". Raconteur. 27 June 2016. Archived from the original on 2
December 2016. Retrieved 3 December 2016.
[2]Tapscott, Don; Tapscott, Alex (8 May 2016). "Here's Why Blockchains Will Change the World".
Fortune Archived from the original on 13 November 2016. Retrieved 16 November 2016.
Paper ID : 220943 Category : UG
Thank you
Special Mentions (if any)
Paper ID : 220943 Category : UG

Más contenido relacionado

Similar a 220943-RSP.pptx

IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutionsijtsrd
 
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docx
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docxInternet of Things 10 (2020) 10 0 081 Contents lists avail.docx
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docxLaticiaGrissomzz
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...ijistjournal
 
Blockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfBlockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfRosalie Lauren
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
Does the Convergence of the Blockchain, the Internet of Things and Artificial...
Does the Convergence of the Blockchain, the Internet of Things and Artificial...Does the Convergence of the Blockchain, the Internet of Things and Artificial...
Does the Convergence of the Blockchain, the Internet of Things and Artificial...eraser Juan José Calderón
 
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...ijmnct
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...IJNSA Journal
 
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)mlaij
 
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...ijgca
 
Blockchain technology and internet of things: review, challenge and security...
Blockchain technology and internet of things: review, challenge  and security...Blockchain technology and internet of things: review, challenge  and security...
Blockchain technology and internet of things: review, challenge and security...IJECEIAES
 
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)NUS-ISS
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYIRJET Journal
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
 
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
 

Similar a 220943-RSP.pptx (20)

IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docx
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docxInternet of Things 10 (2020) 10 0 081 Contents lists avail.docx
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docx
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
 
Blockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdfBlockchain IoT Security Why do we need it.pdf
Blockchain IoT Security Why do we need it.pdf
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Blockchain with iot
Blockchain with iotBlockchain with iot
Blockchain with iot
 
Does the Convergence of the Blockchain, the Internet of Things and Artificial...
Does the Convergence of the Blockchain, the Internet of Things and Artificial...Does the Convergence of the Blockchain, the Internet of Things and Artificial...
Does the Convergence of the Blockchain, the Internet of Things and Artificial...
 
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
 
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
 
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
 
Blockchain technology and internet of things: review, challenge and security...
Blockchain technology and internet of things: review, challenge  and security...Blockchain technology and internet of things: review, challenge  and security...
Blockchain technology and internet of things: review, challenge and security...
 
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
 
76 s201918
76 s20191876 s201918
76 s201918
 
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)
 
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
 

Último

Navigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and HiringNavigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and Hiringkaran651042
 
MIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewMIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewSheldon Byron
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewNilendra Kumar
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证diploma001
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Riya Pathan
 
Issues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxIssues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxJenniferPeraro1
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量sehgh15heh
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样umasea
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
Back on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveBack on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveMarharyta Nedzelska
 
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一fjjwgk
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...nitagrag2
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...RegineManuel2
 
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一F La
 
Protection of Children in context of IHL and Counter Terrorism
Protection of Children in context of IHL and  Counter TerrorismProtection of Children in context of IHL and  Counter Terrorism
Protection of Children in context of IHL and Counter TerrorismNilendra Kumar
 

Último (20)

Navigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and HiringNavigating the Data Economy: Transforming Recruitment and Hiring
Navigating the Data Economy: Transforming Recruitment and Hiring
 
MIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewMIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx review
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interviewCrack JAG. Guidance program for entry to JAG Dept. & SSB interview
Crack JAG. Guidance program for entry to JAG Dept. & SSB interview
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713
 
Issues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxIssues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptx
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
Back on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental LeaveBack on Track: Navigating the Return to Work after Parental Leave
Back on Track: Navigating the Return to Work after Parental Leave
 
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
 
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort ServiceYoung Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
 
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
 
Protection of Children in context of IHL and Counter Terrorism
Protection of Children in context of IHL and  Counter TerrorismProtection of Children in context of IHL and  Counter Terrorism
Protection of Children in context of IHL and Counter Terrorism
 

220943-RSP.pptx

  • 1. Second International Conference on Advances in Engineering and Technology (ICAET-2022)- (Online) ICAET-2022 Organised by RSP Conference Hub, Coimbatore, Tamilnadu, India Date: 29/09/2022& 30/09/2022 Paper ID : 220943 Category : UG Paper Title : BLOCKCHAIN BASED SOLUTION VIA COMPUTER SCIENCE TO SECURE IOT Presented by Mr. Pugalenthi M S, Student - UG Bannari Amman Institute of Technology, Erode. Authors Details Mr. Pugalenthi M S, Mr. Dakshinesh M S, Mr. Pibhin Chandra S, Ms. Rithani R S, Ms. Dhanushika Shree V Student - UG Bannari Amman Institute of Technology, Erode. Paper Id : 220943 Presenter Category : UG
  • 2. Key talking points  Abstract  Introduction  Literature Review  Methodology  Results & Discussion  Conclusion Paper ID : 220943 Category : UG PRESENTATION FRAMEWORK
  • 3. ABSTRACT  Our idea is to make IOT a secure on with the help of blockchain technology Via Computer Science  We all know that the COP is achieved through the advancements seen in wireless sensor network devices that were able to communicate through the network thereby exchanging information and performing various analysis.  In internet of things, the exchange of information and data authentication is only done through the central server not by any other source there by leading to the security and privacy concerns.  Chances of device spoofing, less reliability, false authentication in data sharing could happen.  To address such security threat and concerns over the privacy, a central server is eliminated and blockchain technology is introduced as a part of IOT. Paper ID : 220943 Category : UG
  • 4. Introduction  The largely unregulated IoT market leaves plenty of room for device hacking which can lead to a lot of speculation.  IoT applications such as smart homes, smart gadgets and smart cars, this is the biggest problem which can lead to a dangerous problem for the consumer. A hacker or an un authorized person, could take over a self-driving car without appropriate permission with someone in it, or make very costly purchases based on access levels given to an Internet of Things system.  While there are many security recommendations for IOT devices, such as biometrics and two-factor authorization or authentication still there is a lot of loop hole for security, one potential solution is blockchain IOT security.  Blockchain, which is most familiar for bitcoin and Ethereum which are the famous types of cryptocurrencies, offers an intriguing solution for IoT security.  Blockchain contains strong protections against data tampering, locking access to Internet of things devices which is pretty good, and allowing compromised devices in an IoT network to be shut down. Hyundai the famous car maker has recently backed a blockchain start-up. Paper ID : 220943 Category : UG
  • 5. Literature Review  This work presents a brief introduction of the IoT accompanied by a summary of major security requirements and challenges in IoT.  This work presents an in-depth survey and explores the state-of-the-art blockchain technology by highlighting its background, characteristics, classification, architecture and consensus mechanisms.  This work highlights the motivation behind integrating blockchain technology and IoT by exploring the achieved security improvements in this regard.  This work comprehensively reviews the recent research efforts on blockchain based solutions for enhancing IoT security and various blockchain based IoT applications.  Finally, in addition to highlighting the research challenges in decentralizing IoT systems using blockchain technology, this work enumerates several future research directions for open IoT security problems. Paper ID : 220943 Category : UG
  • 6. Methodology Paper ID : 220943 Category : UG
  • 7. INTERNET OF THINGS:  In this session, we learn briefly about Internet of Things (IOT) as it is one of the vast fields in Technology. It makes the object such as the fan, heater, air conditioners and so on gets smart with provision of various things.  Without the Internet Protocol (IP), we can’t access the IOT devices. It can get access at minimum-specified IPv4 address and goes up IPv6 as the latest support.  ADRC means Auto Discovery Resource Control defines an application layer that initiates protocol and to implement applications on IOT devices.  Upon the Internet of Things, there are four core security threats that are making disadvantage to this paper. Above all, it makes that lack of a singular, and to solve what was the straightforward solution for protecting theirs security.
  • 8. BLOCK CHAIN:  Block chain is a new trending technology which we can store data securely and it is a decentralized, distributed ledger that can make the blocs linked with hashing.  One of the prominent hashing algorithms is SHA- 256. It can’t change or hack the trans- system.  At Block chain, the biggest trending Innovation about blockchain is , if we do to prove it was safe for the peoples, then it increases adoption within the IoT security area. Its transparency and traceability, blockchain gained interaction among the techies and for the students who took on computer side department.  According to Blockchain bounce, it can help for public or nationalized bankand private bank sectors which we prevent bouncing in the account. It also promises security through truth and transparency.
  • 9. FUTURE TRENDS  Blockchain is at the nexus of technologies like IoT, AI and Cloud. It has means of bringing the missing elements of trust that is currently lacking from these technologies. Trust is gained through diversity. user interface, integrity of users.  When Artificial Intelligence, IoT and Cloud computing use blockchain to track provenance, proofs and permissions associated with data used and emanating from these systems the trust in the data is increased rapidly.  This trust will allow IoT, AI and Cloud to be adopted without fear of compromise and closing the loop holes of security in these technologies, ushering in a new era of application and adoption of these technologies to change everyday life for the betterment of the consumer.
  • 10. REFERENCES [1] "The future of blockchain in 8 charts". Raconteur. 27 June 2016. Archived from the original on 2 December 2016. Retrieved 3 December 2016. [2]Tapscott, Don; Tapscott, Alex (8 May 2016). "Here's Why Blockchains Will Change the World". Fortune Archived from the original on 13 November 2016. Retrieved 16 November 2016. Paper ID : 220943 Category : UG
  • 11. Thank you Special Mentions (if any) Paper ID : 220943 Category : UG